| US8499350B1 (en) | 2009-07-29 | 2013-07-30 | Symantec Corporation | Detecting malware through package behavior |
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US10210162B1 (en) | 2010-03-29 | 2019-02-19 | Carbonite, Inc. | Log file management |
| US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
| US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
| US9690635B2 (en) | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
| US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
| US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
| US9715325B1 (en) | 2012-06-21 | 2017-07-25 | Open Text Corporation | Activity stream based interaction |
| US9330257B2 (en) | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
| US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
| US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
| US9111095B2 (en) | 2012-08-29 | 2015-08-18 | The Johns Hopkins University | Apparatus and method for identifying similarity via dynamic decimation of token sequence n-grams |
| US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
| US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
| US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
| US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
| US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
| US9053434B2 (en) | 2013-03-15 | 2015-06-09 | Hewlett-Packard Development Company, L.P. | Determining an obverse weight |
| RU2568285C2 (en)* | 2013-09-30 | 2015-11-20 | Закрытое акционерное общество "Лаборатория Касперского" | Method and system for analysing operation of software detection rules |
| EP3139297B1 (en)* | 2014-06-11 | 2019-04-03 | Nippon Telegraph and Telephone Corporation | Malware determination device, malware determination system, malware determination method, and program |
| WO2015200211A1 (en) | 2014-06-22 | 2015-12-30 | Webroot Inc. | Network threat prediction and blocking |
| US10708296B2 (en) | 2015-03-16 | 2020-07-07 | Threattrack Security, Inc. | Malware detection based on training using automatic feature pruning with anomaly detection of execution graphs |
| US10395133B1 (en) | 2015-05-08 | 2019-08-27 | Open Text Corporation | Image box filtering for optical character recognition |
| US10599844B2 (en) | 2015-05-12 | 2020-03-24 | Webroot, Inc. | Automatic threat detection of executable files based on static data analysis |
| US10289686B1 (en) | 2015-06-30 | 2019-05-14 | Open Text Corporation | Method and system for using dynamic content types |
| US20180005136A1 (en)* | 2016-07-01 | 2018-01-04 | Yi Gai | Machine learning in adversarial environments |
| US10489589B2 (en)* | 2016-11-21 | 2019-11-26 | Cylance Inc. | Anomaly based malware detection |
| US10817603B2 (en) | 2017-08-29 | 2020-10-27 | Target Brands, Inc. | Computer security system with malicious script document identification |
| US10728034B2 (en) | 2018-02-23 | 2020-07-28 | Webroot Inc. | Security privilege escalation exploit detection and mitigation |
| US11444957B2 (en)* | 2018-07-31 | 2022-09-13 | Fortinet, Inc. | Automated feature extraction and artificial intelligence (AI) based detection and classification of malware |
| US11416622B2 (en)* | 2018-08-20 | 2022-08-16 | Veracode, Inc. | Open source vulnerability prediction with machine learning ensemble |
| CN109858251B (en)* | 2019-02-26 | 2023-02-10 | 哈尔滨工程大学 | Malicious code classification and detection method based on Bagging ensemble learning algorithm |
| EP3918500B1 (en)* | 2019-03-05 | 2024-04-24 | Siemens Industry Software Inc. | Machine learning-based anomaly detections for embedded software applications |
| US11314863B2 (en) | 2019-03-27 | 2022-04-26 | Webroot, Inc. | Behavioral threat detection definition and compilation |
| KR102068507B1 (en)* | 2019-07-11 | 2020-01-21 | (주)시큐레이어 | Post-processing method for determining reliability of machine learning model and the device using the same |
| US11374946B2 (en) | 2019-07-19 | 2022-06-28 | Palo Alto Networks, Inc. | Inline malware detection |
| US12430437B2 (en) | 2019-07-19 | 2025-09-30 | Palo Alto Networks, Inc. | Specific file detection baked into machine learning pipelines |
| CN111178435B (en)* | 2019-12-30 | 2022-03-22 | 山东英信计算机技术有限公司 | Classification model training method and system, electronic equipment and storage medium |
| US11977632B2 (en)* | 2020-04-23 | 2024-05-07 | Booz Allen Hamilton Inc. | Evaluating automatic malware classifiers in the absence of reference labels |
| CN112861135B (en)* | 2021-04-12 | 2024-05-31 | 中南大学 | Malicious code detection method based on attention mechanism |
| CN118885744B (en)* | 2024-09-24 | 2024-12-31 | 山东海纳智能装备科技股份有限公司 | Online monitoring method and system for deformation of mine filling body |